Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

InvalidSecurity certificate

Posted on 2009-05-04
3
Medium Priority
?
259 Views
Last Modified: 2012-06-27
If you visit a site with an expired certificate, is  your "conversation" with this site no longer encrypted?
0
Comment
Question by:lairdreed
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
briandunkle earned 2000 total points
ID: 24299638
Depends whether you override the browser and allow the certificate. If you allow it, and the URL shows "HTTPS" rather than "HTTP", it's still encrypted.
It's similar to self-generated certificates. You'll get the warning about it being invalid, but if you accept it anyway, you're still encrypted.
The "validity" (issued by a trusted authority) and expiration are entirely separate from the encryption.
0
 
LVL 7

Expert Comment

by:briandunkle
ID: 24299648
"override the browser's objection" I mean, and force it to continue, or import the certificate, or whatever your particular browser says.
0
 

Author Closing Comment

by:lairdreed
ID: 31577778
Thank you for the input.
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you need a certificate so you can offer SSL encryption.  But which one should you get?  There are so many choices out there! Here is a generic overview of the main types of SSL certificates sold by the majority of commercial Certification Auth…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…

660 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question